Source: Microsoft |

Artificial intelligence (AI) could create a turning point for financial inclusion in Africa (By Lillian Barnard)

AI tools can analyse data from client discussions, producing legal documents in simple language and at a fraction of the cost of what it would typically take to draft a contract

By Lillian Barnard, President of Microsoft Africa (www.Microsoft.com). It’s difficult to imagine a time before the widespread adoption of mobile technology in Africa – particularly where financial services are concerned. For millions of unbanked people, transactions were limited to cash, postal services or even the barter system. Now, in much…

KnowBe4
Source: KnowBe4 |

What are Multifactor authentication (MFA) fatigue attacks and how can they be prevented?

The best way to prevent MFA fatigue attacks in organisations is not to use push notifications

Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering increasingly clever ways to bypass it. During an attack (https://apo-opa.co/4aT1XGc) on Uber’s…

Source: Parliament of the Republic of Uganda |

Uganda National Bureau of Statistics (UBOS) seeks additional Shs23.7 billion to cover tax for census tablets

Despite UBOS's plea for a tax waiver, the finance ministry opted for a deferral, prompting concerns about future compliance with Uganda Revenue Authority (URA) requirements

The Uganda National Bureau of Statistics (UBOS) is seeking an additional Shs23.7 billion to settle tax obligations for 120,000 tablet computers procured for the upcoming national population census scheduled for May this year. The tablet computers cost Shs132 billion.  With the Executive Director of UBOS, Chris Mukiza, at the forefront,…

Source: Equatorial Guinea: Official Web Page of the Government |

Equatorial Guinea: Adoption of articles defining computer crime and cybercrime

The cybercrime section covers, among other things, offences related to impersonating or taking over the computer identity of another person

In the Chamber of Deputies, the parliamentary commission looking at the draft Law to Regulate Use of Social Media and Cyberspace adopted on Tuesday the articles determining computer crimes and some cybercrimes, in addition to the penalties and fines that, in each case, will be imposed by the relevant jurisdictional…

Kaspersky
  • Multimedia content

  • Images (1)
    • Kaspersky: tips on what to do if someone tries to hack you
  • All (1)
Source: Kaspersky |

7 tips from Kaspersky on what to do if someone tries to hack you

With cybercriminals becoming more sophisticated in their attempts, it is possible that at some point or another you may interact with a scammer or click on a phishing link

In today’s connected world, it is a matter of when rather than if you will experience someone trying to hack you. With cybercriminals becoming more sophisticated in their attempts, it is possible that at some point or another you may interact with a scammer or click on a phishing link.…

EMURGO Africa
  • Multimedia content

  • Images (5)
    • EMURGO Africa Unveils ’EMURGO Labs’ (1)
    • EMURGO Africa Unveils ’EMURGO Labs’ (2)
    • EMURGO Africa Unveils ’EMURGO Labs’ (3)
    • EMURGO Africa Unveils ’EMURGO Labs’ (4)
    • EMURGO Africa Unveils ’EMURGO Labs’ (5)
  • Documents (1)
    • EMURGO Africa Unveils ’EMURGO Labs’
  • All (6)
Source: EMURGO Africa |

EMURGO Africa Unveils ’EMURGO Labs’

A New Development Hub Fueling Web3 Across Africa, Middle East and GCC

EMURGO Africa (www.EMURGO.africa), the investment and commercial arm of Cardano in Africa, today announced the launch of EMURGO Labs, a dedicated development entity for emerging Web3 technologies. EMURGO Labs is designed to support the growth of established and nascent Web2 and Web3 organizations. EMURGO Labs is set to spearhead the…

Source: Check Point Software Technologies Ltd. |

Check Point Software Unveils Infinity AI Copilot: Transforming Cyber security with Intelligent GenAI Automation and Support

Check Point's latest innovation, brings AI-powered efficiency and collaboration to cyber security management across platforms

Check Point Software Technologies Ltd. (www.CheckPoint.com) (NASDAQ: CHKP), a leading AI-powered, cloud-delivered cyber security platform provider, today announced the launch of the first-generation Infinity AI Copilot. Leveraging the convergence of AI and cloud technologies, Infinity AI Copilot addresses the growing global shortage of cyber security practitioners by boosting the efficiency…

Kaspersky
  • Multimedia content

  • Images (1)
    • Brandon Muller, Technical Expert for the MEA region at Kaspersky
  • All (1)
Source: Kaspersky |

Employees in the Middle East, Turkiye, Africa region think they would earn 41% more if they had better digital skills

The lack of digital skills may not only impede one’s career and deprive them of income, but also produces serious risks for the cybersecurity of the organisation where this person is employed

According to a recent Kaspersky survey[1] (www.Kaspersky.co.za), over half of employees surveyed in the Middle East, Turkiye and Africa (META) region feel the lack of digital skills when working on computers and other digital equipment. If they had higher digital skills, employees think they would earn 41% more, on average.…

Source: UNICEF Sierra Leone |

The United Nations Children's Fund (UNICEF) Donates Computers and Projectors to the Ministry of Communications, Technology, and Innovation for Young People

Currently, less than 1 per cent of schools in Sierra Leone are connected to the Internet and only three out of ten people have access to the Internet

UNICEF Sierra Leone handed over 113 laptops and 23 projectors to the Ministry of Communications, Technology, and Innovation for young people in 39 schools across the country as part of the Giga project. Giga is a UNICEF-International Telecommunications Union (ITU) initiative to connect every school to the Internet and every young…

Canon Central and North Africa (CCNA)
  • Multimedia content

  • Images (1)
    • Quentyn Taylor, Director of Information Security, Canon Europe
  • All (1)
Source: Canon Central and North Africa (CCNA) |

Modernizing Security in Africa's Rising Print Landscape (By Quentyn Taylor)

In the modern print landscape, businesses in Africa need to think about creative solutions to meet customers’ needs, while maintaining cyber hygiene with a 360 -degree approach

By Quentyn Taylor, Director of Information Security, Canon Europe (www.Canon-CNA.com) It’s no longer enough to just print and sell a product. In the modern print landscape, businesses in Africa need to think about creative solutions to meet customers’ needs, while maintaining cyber hygiene with a 360 -degree approach. With Africa’s…